A highly sophisticated threat actor has stolen tools used by cybersecurity company FireEye to evaluate the security posture of enterprise systems, which unauthorized third-party users could abuse to take control of targeted systems, the Cybersecurity and Infrastructure Security Agency announced yesterday.

CISA recommends cybersecurity practitioners review details on the theft of the FireEye Red Team tools and countermeasures available to minimize the threat. 

This is a really big deal — to say the least. It puts every organization in every sector at risk,” said John Riggi, AHA’s senior advisor for cybersecurity and risk. “It’s equivalent to sophisticated foreign criminals or spies breaking into a highly secure armory and stealing the ‘good guys’ most capable and effective weapons. I can’t emphasize enough to all organizations, especially those that possess sensitive data and research, to implement FireEye’s countermeasures as soon as possible.”  

For more on this and other cybersecurity and risk issues, hospital and health system leaders may contact Riggi at jriggi@aha.org.

Headline
A joint advisory released April 23 from U.S. and international cybersecurity agencies, including the Cybersecurity and Infrastructure Security Agency, FBI,…
Headline
FBI Co-deputy Director Andrew Bailey discussed a rise in cyber and physical threats impacting health care. He discussed health care as the top critical…
Headline
Health care and public health was the top sector targeted for cyberthreats in 2025, according to the FBI’s latest annual report on internet crimes. There were…
Headline
The Cybersecurity and Infrastructure Security Agency released an alert March 27 on a vulnerability in F5 BIG-IP Access Policy Manager software that is being…
Headline
The FBI released an alert March 20 warning of a technique used by cyber actors working on behalf of the Iranian government to conduct malicious cyber activity…
Headline
The Cybersecurity and Infrastructure Security Agency March 18 released an alert urging U.S. organizations to harden their endpoint management systems following…